US11968247B2 - Using a web proxy to provide a secure remotely controlled system, device, and method - Google Patents
Using a web proxy to provide a secure remotely controlled system, device, and method Download PDFInfo
- Publication number
- US11968247B2 US11968247B2 US18/099,301 US202318099301A US11968247B2 US 11968247 B2 US11968247 B2 US 11968247B2 US 202318099301 A US202318099301 A US 202318099301A US 11968247 B2 US11968247 B2 US 11968247B2
- Authority
- US
- United States
- Prior art keywords
- website
- shuttle
- gateway
- remote
- proxy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04842—Selection of displayed objects or displayed text elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
- H04L12/2818—Controlling appliance services of a home automation network by calling their functionalities from a device located outside both the home and the home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/562—Brokering proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
Definitions
- the following relates to a system, device, and method for implementing secure and remote control over audio visual (AV) equipment included in an AV network by enabling a web browser running on a user device to utilize a web proxy shuttle to communicate control commands to an AV gateway that controls the AV equipment.
- AV audio visual
- Enterprise building environments are equipped with audio visual systems to enhance operational functionality. These AV systems may be installed in multiple different rooms and may be controlled by one or more central AV gateway devices. However, cost considerations may result in the AV gateway device not being installed in every room where AV equipment is present, making real-time control over the AV equipment in such rooms difficult. Furthermore, it may be desirable to restrict access to an AV gateway device to avoid contamination by the public or enhance cybersecurity.
- VPN virtual private network
- a computing device comprising a display screen, a processor, and a storage device configured to store machine-readable instructions that, when executed by the processor, causes the processor to: open a web browser application, control the web browser application to connect to a website, display the website on the display screen via the web browser, wherein the website includes a remote equipment controlling graphical user interface (GUI), execute a remote gateway service, receive a control command input via the remote equipment controlling GUI, wherein the control command is configured to control a feature of a remote equipment, and transmit the control commands to the remote gateway service, wherein the remote gateway service is configured to shuttle the control command to a gateway device configured to operate control of the remote equipment.
- GUI remote equipment controlling graphical user interface
- a gateway device comprising a network interface configured to communicate with one or more equipment devices included in a private network, a processor; and a storage device configured to store machine-readable instructions that, when executed by the processor, causes the processor to: receive, from a remote gateway service, a control command input from a user device running a web browser visiting a website, wherein the control command corresponds to a control command option included in the web site; execute the control command with respect to one or more of the equipment devices included in the private network; and generate a response message including a confirmation the control command was executed.
- FIG. 1 shows an exemplary system block diagram of a secure remotely controlled system, according to an embodiment of the present disclosure.
- FIG. 2 shows an exemplary flow diagram describing a method for implementing a secure remotely controlled process, according to an embodiment of the present disclosure.
- FIG. 3 shows an exemplary block diagram of a secure remotely controlled system, according to an embodiment of the present disclosure.
- FIG. 4 shows a block diagram of an exemplary computing device system that is representative of a computing device included in the secure remotely controlled system, according to an embodiment of the present disclosure.
- the secure remote access solution described herein may also apply to the remote control of devices connected together via a private network more generally using a switch/controller device in place of the AV gateway.
- the AV gateway is a control device that a user may use to control one or more AV equipment that is in communication with the AV gateway.
- the AV gateway may include, either within a same structure or as a separate device in close proximity, a touch screen display for controlling the AV equipment.
- a touch screen display for controlling the AV equipment.
- the current disclosure presents a solution that allows a user to utilize their own mobile device to transmit control commands to the AV gateway in a secure manner by utilizing a web proxy shuttle to “shuttle” control commands entered into the user device to the AV gateway, as described in more detail herein.
- the web proxy shuttle offers a secure solution for a remote user device to communicate with the AV gateway that is located behind a security firewall that protects the AV network.
- the web proxy shuttle is also a simple remote access solution that can be implemented quickly and securely, without overly burdening enterprise resources.
- FIG. 1 shows an exemplary block diagram of a secure remotely controlled system 100 that utilizes the web proxy cloud shuttle 60 to enable a user device 10 to securely communicate with an AV gateway 30 that is included in an AV network 110 for controlling one or more AV equipment 71 - 73 , where the AV gateway and AV equipment sit securely behind a security firewall 40 .
- the AV gateway 30 may include a display screen 31 , where the display screen 31 may be a touch screen.
- the display screen 31 is provided to display a control graphical user interface (GUI) for controlling various control options relating to AV equipment connected to the AV gateway.
- GUI control graphical user interface
- the display screen 31 may be an integral part of the same AV gateway, or according to other embodiments the display screen 31 may be a separate device that is in direct communication with the AV gateway 30 .
- the remote AV equipment 71 - 73 may be speakers, display devices, AV mixers, extenders, or other equipment that may be part of a building's AV network 110 .
- the building's AV network 110 is connected via an AV local area network (AV LAN) 2 , where the AV LAN 2 is behind a firewall 40 to protect the building's AV network 110 from outside intrusion.
- AV LAN AV local area network
- the secure remotely controlled system 100 is configured to allow a user to enter the building and interact with the building's AV system 110 by utilizing the user device 10 .
- the user device 10 includes a display screen 11 and an image capturing device 12 capable of taking still images and/or video images.
- the user device 10 includes a network interface to connect to the Internet 1 via a Wi-Fi network connection 3 or a cellular data network connection 4 .
- the user device 10 is configured to execute a web browser application to enable the user device 10 to access an administrative website 50 , where the administrative website 50 is configured to run protocols for authorizing the user for controlling the AV equipment 71 - 73 (e.g., authorizing the user may include authenticating and/or authorizing the user).
- the website 50 may be in communication with a database 80 storing information for identifying users that are authorized to control the AV equipment 71 - 73 , as well as security information for authenticating the users (e.g., username and passwords, or other authentication information assigned to the user).
- a database 80 storing information for identifying users that are authorized to control the AV equipment 71 - 73 , as well as security information for authenticating the users (e.g., username and passwords, or other authentication information assigned to the user).
- the browser executing on the user device 10 displays a website 50 that includes a GUI mirroring the control GUI available on the AV gateway 30 for controlling the AV equipment 71 - 73 .
- the control options may include, for example, selecting one or more specific AV equipment 71 - 73 to control according to equipment names and/or building location, controlling AV characteristics of the selected AV equipment 71 - 73 (e.g., volume control, display controls, or the like), turning on/off the selected AV equipment 71 - 73 , scheduling meeting rooms, or other features. So once the browser navigates to the address of the website 50 , the same control GUI available on the display screen 31 for controlling the AV gateway 30 will be displayed on the display screen 11 of the user device 10 . The user may then interact with the control GUI displayed on the user device 10 to control the AV gateway 30 , the same as if the user were interacting with the control GUI displayed on the display screen 31 corresponding to the AV gateway 30 .
- the website 50 is operated by an administrator that controls user authorization and authentication protocols for accessing the AV gateway 30 that resides behind the firewall 40 .
- the website 50 and/or the database 80 may be offered as a cloud service hosted on one or more cloud servers, where the cloud server(s) hosting the website 50 and/or the database 80 are disconnected from the AV gateway 30 .
- the administrator is also able to update the website 50 by providing sync/push updates to the website 50 without the user's initiation.
- the website 50 may be configured to be read-only.
- the website 50 creates a secure public endpoint for the user device 10 to access the AV gateway 30 by using the web proxy cloud shuttle 60 to shuttle information to the AV gateway 30 (e.g., the website 50 utilizes the cloud shuttle 60 to communicate the control commands that are input by the user into the GUI displayed on the web site 50 ).
- the cloud shuttle 60 is a remote gateway service configured to communicate control commands from the user device 10 to the AV gateway 30 .
- the cloud shuttle 60 is a secure cloud hosted website configured to serve the AV gateway 30 by shuttling data between the web browser running on the user device 10 and the AV gateway 30 .
- Using the cloud shuttle 60 to communicate the control commands provides a more efficient use of computing resources compared to other means of implementing proxy controls in that the cloud shuttle 60 is a discrete packet of (relatively) short data that is transmitted in a specific instance as needed, as opposed to a persistent data transmission connection that is used in other proxy control schemes that require a continuous stream of data to be exchanged.
- the shuttle proxy 20 resides behind the firewall 40 , where the shuttle proxy 20 is configured to communicate a response confirming a control command provided by the cloud shuttle 60 has been implemented by the AV gateway 30 .
- FIG. 2 shows an exemplary flow diagram 200 describing a process for implementing a secure remote control of the AV gateway 30 .
- the description for the flow diagram 200 is made with reference to the components included in the secure remotely controlled system 100 , although the process may be applicable to other similar systems.
- a web browser running on the user device 10 is navigated to the website 50 .
- the website 50 is an administrative website that may require authorization of the user before allowing the user to proceed to the control options GUI for controlling the AV gateway 30 .
- FIG. 3 shows how a web browser running on the user device 10 is able to access the website 50 at velocity.atlona.com.
- the website implements security protocols to confirm the user is authorized to proceed to the control options GUI for controlling the AV gateway 30 .
- the user may be asked to input authorization information (e.g., username and password) into the website 50 , where the website then confirms the input authorization information against administrative data stored in the database 80 .
- FIG. 3 shows how the website 50 accessing administrative data stored on the database 80 to confirm a user's input authorization information.
- the web browser running on the user device 10 is enabled to proceed to the portions of the website 50 that provide the control options GUI for controlling the AV gateway 30 . If the authorization protocol is not passed at 203 , the website 50 may allow for a predetermined number of further user attempts before locking out the user.
- the website 50 receive user input control commands and executes a remote gateway service by accessing the cloud shuttle 60 .
- FIG. 3 shows the website 50 initiating the remote gateway service that is operating as the cloud shuttle 60 .
- the control commands are transmitted to the cloud shuttle 60 and transmitted to the AV gateway 30 .
- FIG. 3 shows a URL corresponding to a secure website that is being utilized as a proxy to serve as the cloud shuttle 60 .
- FIG. 3 shows a specific web service being used, any available web service may be used for implementing the cloud shuttle 60 .
- control commands are received by the AV gateway 30 .
- the AV gateway 30 implements the received control commands to control one or more of the AV equipment 71 - 73 .
- the AV gateway 30 submits its response message to the shuttle proxy 20 for the shuttle proxy to publish.
- the website 50 is able to access the response message and present it to the user.
- the remote gateway service e.g., the cloud shuttle 60
- the website 50 may obtain the response message from the shuttle proxy 20
- the website 50 may obtain the response message from the remote gateway service.
- the website 50 may present the response message by displaying onto the web site 50 for the user to read.
- the flow diagram 200 is provided for exemplary purposes, as the secure remotely controlled system 100 may implement other processes that include fewer, or additional, steps to accomplish the secure remote control of the AV gateway 30 utilizing the web proxy tools.
- one or more of the features for implementing the secure remote control attributed to the web site 50 may be implemented on the user device 10 by downloading and executing a secure application on the user device, where the application is configured to implement one or more of the processes described in the flow diagram 200 .
- FIG. 4 illustrates an exemplary computer architecture for a computing device system 400 .
- the computing device system 400 may be representative of the components included in one or more of the user device 10 , the AV gateway 30 , or a server computer hosting the website 50 or one of the cloud platforms hosting the cloud shuttle 60 and/or shuttle proxy illustrated in the secure remotely controlled system 100 of FIG. 1 .
- the computing device system 400 may additionally include software, hardware, and/or circuitry for implementing attributed features as described herein.
- the computing device system 400 includes a processor 410 , a main memory 420 , a static memory 430 , an output device 450 (e.g., a display or speaker), an input device 460 , and a storage device 470 , communicating via a bus 401 .
- the bus 401 may represent one or more busses, e.g., USB, PCI, ISA (Industry Standard Architecture), X-Bus, EISA (Extended Industry Standard Architecture), or any other appropriate bus and/or bridge (also called a bus controller).
- the processor 410 represents a central processing unit of any type of architecture, such as a CISC (Complex Instruction Set Computing), RISC (Reduced Instruction Set Computing), VLIW (Very Long Instruction Word), or a hybrid architecture, although any appropriate processor may be used.
- the processor 410 executes instructions 421 , 431 , 472 stored on one or more of the main memory 420 , static memory 430 , or storage device 470 , respectively.
- the processor 410 may also include portions of the computing device system 400 that control the operation of the entire computing device system 400 .
- the processor 410 may also represent a controller that organizes data and program storage in memory and transfers data and other information between the various parts of the computing device system 400 .
- the processor 410 is configured to receive input data and/or user commands through input device 460 or received from a network 402 through a network interface 440 .
- Input device 460 may be a keyboard, mouse or other pointing device, trackball, scroll, button, touchpad, touch screen, keypad, microphone, speech recognition device, video recognition device, accelerometer, gyroscope, global positioning system (GPS) transceiver, or any other appropriate mechanism for the user to input data to computing device system 400 and control operation of computing device system 400 .
- Input device 460 as illustrated in FIG. 4 may be representative of any number and type of input devices.
- the processor 410 may also communicate with other computer systems via the network 402 to receive control commands or instructions 421 , 431 , 472 , where processor 410 may control the storage of such control commands or instructions 421 , 431 , 472 into any one or more of the main memory 420 (e.g., random access memory (RAM)), static memory 430 (e.g., read only memory (ROM)), or the storage device 470 .
- the processor 410 may then read and execute the instructions 421 , 431 , 472 from any one or more of the main memory 420 , static memory 430 , or storage device 470 .
- the instructions 421 , 431 , 472 may also be stored onto any one or more of the main memory 420 , static memory 430 , or storage device 470 through other sources.
- the instructions 421 , 431 , 472 may correspond to, for example, instructions for controlling AV equipment 71 - 73 included in the secure remotely controlled system 100 illustrated in FIG. 1 .
- computing device system 400 is represented in FIG. 4 as a single processor 410 and a single bus 401 , the disclosed embodiments apply equally to computing device system that may have multiple processors and to computing device system that may have multiple busses with some or all performing different functions in different ways.
- the storage device 470 represents one or more mechanisms for storing data.
- the storage device 470 may include a computer readable medium 471 such as read-only memory (ROM), RAM, non-volatile storage media, optical storage media, flash memory devices, and/or other machine-readable media. In other embodiments, any appropriate type of storage device may be used. Although only one storage device 470 is shown, multiple storage devices and multiple types of storage devices may be present.
- the computing device system 400 is drawn to contain the storage device 470 , it may be distributed across other computer systems that are in communication with the computing device system 400 , such as a server in communication with the computing device system 400 . For example, when the computing device system 400 is representative of the user device 10 , the storage device 470 may be distributed across to include a cloud storage platform.
- the storage device 470 may include a controller (not shown) and a computer readable medium 471 storing instructions 472 capable of being executed by the processor 410 to carry out control of the remote AV equipment 71 - 73 , as described herein. In another embodiment some, or all, the functions are carried out via hardware in lieu of a processor-based system.
- the included controller is a web application browser, but in other embodiments the controller may be a database system, a file system, an electronic mail system, a media manager, an image manager, or may include any other functions capable of accessing data items.
- the output device 450 is configured to present information to the user.
- the output device 450 may be a display such as a liquid crystal display (LCD), a gas or plasma-based flat-panel display, or a traditional cathode-ray tube (CRT) display or other well-known type of display that may, or may not, also include a touch screen capability.
- the output device 450 may function to display a graphical user interface (GUI) such as the GUI for enabling a user to control the AV equipment, as described herein.
- GUI graphical user interface
- the output device 450 may be a speaker configured to output audible information to the user.
- any combination of output devices may be represented by the output device 450 .
- Computing device system 400 also includes the network interface 440 that allows communication with other computers via the network 402 , where the network 402 may be any suitable network and may support any appropriate protocol suitable for communication to/from computing device system 400 .
- the network 402 may support wireless communications.
- the network 402 may support hard-wired communications, such as a telephone line or cable.
- the network 402 may support the Ethernet IEEE (Institute of Electrical and Electronics Engineers) 802.3x specification.
- the network 402 may be the Internet (e.g., the Internet 1 illustrated in FIG. 1 ) and may support IP (Internet Protocol).
- the network 402 may be a LAN (e.g., AV LAN 2 illustrated in FIG.
- the network 402 may be a hotspot service provider network.
- network 402 may be an intranet.
- the network 402 may be a GPRS (General Packet Radio Service) network.
- the network 402 may be any appropriate cellular data network or cell-based radio network technology.
- the network 402 may be an IEEE 802.11 wireless network.
- the network 402 may be representative of an Internet of Things (IoT) network.
- the network 402 may be any suitable network or combination of networks. Although one network 402 is shown in FIG. 4 , the network 402 may be representative of any number of networks (of the same or different types) that may be utilized.
- the network interface 440 provides the computing device system 400 with connectivity to the network 402 through any compatible communications protocol.
- the network interface 440 sends and/or receives data from the network 402 via a wireless or wired transceiver 441 .
- the transceiver 441 may be a cellular frequency, radio frequency (RF), infrared (IR), Bluetooth, or any of a number of known wireless or wired transmission systems capable of communicating with the network 402 or other computer device having some or all of the features of the computing device system 400 .
- the network interface 440 as illustrated in FIG. 4 may be representative of a single network interface card configured to communicate with one or more different data sources.
- the network interface 440 may be representative of AV related communication ports such as high-definition multimedia interface (HDMI), DisplayPort, or mini DisplayPort (MDP), as well as data communication ports such as ethernet, universal serial bus (USB), power over ethernet (POE), or single pair ethernet (SPE).
- HDMI high-definition multimedia interface
- MDP mini DisplayPort
- data communication ports such as ethernet, universal serial bus (USB), power over ethernet (POE), or single pair ethernet (SPE).
- the computing device system 400 may be implemented using any suitable hardware and/or software, such as a personal computer or other electronic computing device.
- the computing device system 400 may also be a smartphone, portable computer, laptop, tablet or notebook computer, PDA, appliance, IP telephone, server computer device, AV gateway, cloud service platform, or mainframe computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Automation & Control Theory (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Selective Calling Equipment (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (7)
Priority Applications (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US18/099,301 US11968247B2 (en) | 2022-01-27 | 2023-01-20 | Using a web proxy to provide a secure remotely controlled system, device, and method |
| CN202390000200.XU CN222423709U (en) | 2022-01-27 | 2023-01-23 | Computing devices and gateway devices |
| PCT/US2023/011306 WO2023146810A1 (en) | 2022-01-27 | 2023-01-23 | Using a web proxy to provide a secure remotely controlled system, device, and method |
| EP23705819.3A EP4470192A1 (en) | 2022-01-27 | 2023-01-23 | Using a web proxy to provide a secure remotely controlled system, device, and method |
| US18/613,417 US12368770B2 (en) | 2022-01-27 | 2024-03-22 | Using a web proxy to provide a secure remotely controlled system, device, and method |
| US19/250,296 US20250323967A1 (en) | 2022-01-27 | 2025-06-26 | Using a Web Proxy to Provide a Secure Remotely Controlled System, Device, and Method |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202263303527P | 2022-01-27 | 2022-01-27 | |
| US18/099,301 US11968247B2 (en) | 2022-01-27 | 2023-01-20 | Using a web proxy to provide a secure remotely controlled system, device, and method |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/613,417 Continuation US12368770B2 (en) | 2022-01-27 | 2024-03-22 | Using a web proxy to provide a secure remotely controlled system, device, and method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20230239337A1 US20230239337A1 (en) | 2023-07-27 |
| US11968247B2 true US11968247B2 (en) | 2024-04-23 |
Family
ID=87314853
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/099,301 Active US11968247B2 (en) | 2022-01-27 | 2023-01-20 | Using a web proxy to provide a secure remotely controlled system, device, and method |
| US18/613,417 Active US12368770B2 (en) | 2022-01-27 | 2024-03-22 | Using a web proxy to provide a secure remotely controlled system, device, and method |
| US19/250,296 Pending US20250323967A1 (en) | 2022-01-27 | 2025-06-26 | Using a Web Proxy to Provide a Secure Remotely Controlled System, Device, and Method |
Family Applications After (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/613,417 Active US12368770B2 (en) | 2022-01-27 | 2024-03-22 | Using a web proxy to provide a secure remotely controlled system, device, and method |
| US19/250,296 Pending US20250323967A1 (en) | 2022-01-27 | 2025-06-26 | Using a Web Proxy to Provide a Secure Remotely Controlled System, Device, and Method |
Country Status (3)
| Country | Link |
|---|---|
| US (3) | US11968247B2 (en) |
| EP (1) | EP4470192A1 (en) |
| CN (1) | CN222423709U (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118707952A (en) * | 2024-06-03 | 2024-09-27 | 北京伍强智能科技有限公司 | A shuttle vehicle remote control method and device, and electronic equipment |
Citations (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020002627A1 (en) | 2000-06-20 | 2002-01-03 | Graham Stead | Method and system for interconnecting remote intelligent devices with a network |
| US20020103898A1 (en) | 2001-01-31 | 2002-08-01 | Moyer Stanley L. | System and method for using session initiation protocol (SIP) to communicate with networked appliances |
| US20030018753A1 (en) | 2001-07-18 | 2003-01-23 | Ryuken Seki | Remote control proxy method and apparatus |
| US20060089929A1 (en) * | 2004-10-25 | 2006-04-27 | Shimadzu Corporation | Analysis data processing system and analyzing apparatus |
| US20060167818A1 (en) * | 2005-01-21 | 2006-07-27 | David Wentker | Methods and system for performing data exchanges related to financial transactions over a public network |
| US20100241254A1 (en) | 2007-09-05 | 2010-09-23 | Savant Systems Llc | Web browser based remote control for programmable multimedia controller |
| US20100251326A1 (en) * | 2007-10-05 | 2010-09-30 | Sony Corporation | Electronic apparatus and method for turning off firewall ofelectronic apparatus |
| US7975058B2 (en) | 2006-01-31 | 2011-07-05 | Cisco Technology, Inc. | Systems and methods for remote access of network devices having private addresses |
| US20110273625A1 (en) * | 2010-05-10 | 2011-11-10 | Comcast Cable Communications, Llc | Intelligent Remote Control |
| US8745137B2 (en) | 2011-03-14 | 2014-06-03 | Qualcomm Incorporated | Hybrid networking simple-connect setup using proxy device |
| US9306950B2 (en) | 2011-05-13 | 2016-04-05 | Telefonaktiebolaget L M Ericsson (Publ) | Methods, server and proxy agent for dynamically setting up a session between a target resource in a private network and an application on a device |
| US20160156484A1 (en) * | 2014-12-01 | 2016-06-02 | Konica Minolta, Inc. | Information processing system, cloud server, device control method, and non-transitory computer-readable recording medium encoded with device control program |
| US20180299851A1 (en) | 2016-06-21 | 2018-10-18 | Abl Ip Holding Llc | Integrated lighting and building management control gateway |
| US20200326679A1 (en) * | 2019-04-09 | 2020-10-15 | Intertrust Technologies Corporation | Connected device information management systems and methods |
| US20200336564A1 (en) | 2019-04-17 | 2020-10-22 | Sure Universal Ltd. | Seamless connectivity to smart devices, cameras and home care devices over wifi networks and cloud |
| US10867507B2 (en) | 2017-07-16 | 2020-12-15 | Sure Universal Ltd. | Set-top box gateway architecture for universal remote controller |
| US20210044491A1 (en) * | 2019-08-05 | 2021-02-11 | Crestron Electronics, Inc. | Remote control gui for networked touchscreens |
| US20220141290A1 (en) * | 2020-11-04 | 2022-05-05 | Panduit Corp. | Single pair ethernet sensor device and sensor network |
| US20220263911A1 (en) * | 2021-02-18 | 2022-08-18 | Panduit Corp. | Secure remotely controlled system, device, and method |
-
2023
- 2023-01-20 US US18/099,301 patent/US11968247B2/en active Active
- 2023-01-23 CN CN202390000200.XU patent/CN222423709U/en active Active
- 2023-01-23 EP EP23705819.3A patent/EP4470192A1/en active Pending
-
2024
- 2024-03-22 US US18/613,417 patent/US12368770B2/en active Active
-
2025
- 2025-06-26 US US19/250,296 patent/US20250323967A1/en active Pending
Patent Citations (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020002627A1 (en) | 2000-06-20 | 2002-01-03 | Graham Stead | Method and system for interconnecting remote intelligent devices with a network |
| US20020103898A1 (en) | 2001-01-31 | 2002-08-01 | Moyer Stanley L. | System and method for using session initiation protocol (SIP) to communicate with networked appliances |
| US20030018753A1 (en) | 2001-07-18 | 2003-01-23 | Ryuken Seki | Remote control proxy method and apparatus |
| US20060089929A1 (en) * | 2004-10-25 | 2006-04-27 | Shimadzu Corporation | Analysis data processing system and analyzing apparatus |
| US20060167818A1 (en) * | 2005-01-21 | 2006-07-27 | David Wentker | Methods and system for performing data exchanges related to financial transactions over a public network |
| US7975058B2 (en) | 2006-01-31 | 2011-07-05 | Cisco Technology, Inc. | Systems and methods for remote access of network devices having private addresses |
| US20100241254A1 (en) | 2007-09-05 | 2010-09-23 | Savant Systems Llc | Web browser based remote control for programmable multimedia controller |
| US20100251326A1 (en) * | 2007-10-05 | 2010-09-30 | Sony Corporation | Electronic apparatus and method for turning off firewall ofelectronic apparatus |
| US20110273625A1 (en) * | 2010-05-10 | 2011-11-10 | Comcast Cable Communications, Llc | Intelligent Remote Control |
| US8745137B2 (en) | 2011-03-14 | 2014-06-03 | Qualcomm Incorporated | Hybrid networking simple-connect setup using proxy device |
| US9306950B2 (en) | 2011-05-13 | 2016-04-05 | Telefonaktiebolaget L M Ericsson (Publ) | Methods, server and proxy agent for dynamically setting up a session between a target resource in a private network and an application on a device |
| EP2708007B1 (en) | 2011-05-13 | 2016-11-02 | Telefonaktiebolaget LM Ericsson (publ) | Methods, server and proxy agent for dynamically setting up a session between a target resource in a private network and an application on a device |
| US20160156484A1 (en) * | 2014-12-01 | 2016-06-02 | Konica Minolta, Inc. | Information processing system, cloud server, device control method, and non-transitory computer-readable recording medium encoded with device control program |
| US20180299851A1 (en) | 2016-06-21 | 2018-10-18 | Abl Ip Holding Llc | Integrated lighting and building management control gateway |
| US10867507B2 (en) | 2017-07-16 | 2020-12-15 | Sure Universal Ltd. | Set-top box gateway architecture for universal remote controller |
| US20200326679A1 (en) * | 2019-04-09 | 2020-10-15 | Intertrust Technologies Corporation | Connected device information management systems and methods |
| US20200336564A1 (en) | 2019-04-17 | 2020-10-22 | Sure Universal Ltd. | Seamless connectivity to smart devices, cameras and home care devices over wifi networks and cloud |
| US20210044491A1 (en) * | 2019-08-05 | 2021-02-11 | Crestron Electronics, Inc. | Remote control gui for networked touchscreens |
| US20220141290A1 (en) * | 2020-11-04 | 2022-05-05 | Panduit Corp. | Single pair ethernet sensor device and sensor network |
| US20220263911A1 (en) * | 2021-02-18 | 2022-08-18 | Panduit Corp. | Secure remotely controlled system, device, and method |
Also Published As
| Publication number | Publication date |
|---|---|
| US12368770B2 (en) | 2025-07-22 |
| US20250323967A1 (en) | 2025-10-16 |
| US20230239337A1 (en) | 2023-07-27 |
| EP4470192A1 (en) | 2024-12-04 |
| US20240236168A1 (en) | 2024-07-11 |
| CN222423709U (en) | 2025-01-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11902397B2 (en) | Secure remotely controlled system, device, and method | |
| JP6556849B2 (en) | Operating system dongle | |
| EP2901435B1 (en) | A device control method and apparatus | |
| US20250323967A1 (en) | Using a Web Proxy to Provide a Secure Remotely Controlled System, Device, and Method | |
| US11722468B1 (en) | Optimized messaging in a mesh network | |
| US20220116362A1 (en) | Endpoint bypass in a proxy network | |
| US11758401B2 (en) | Network services in a mesh network | |
| CN106648670B (en) | Same-screen common control system and method for cloud classrooms | |
| US11831620B2 (en) | Enabling a hybrid mesh network | |
| EP4047833A1 (en) | Load balancing system, load balancing method, and carrier means | |
| WO2023146810A1 (en) | Using a web proxy to provide a secure remotely controlled system, device, and method | |
| US9288524B2 (en) | Using TV over VPN to present remote device application graphics | |
| WO2023245317A1 (en) | Password protection for screen sharing | |
| US12306980B2 (en) | Network operating system deployment to remote hardware for network extensibility | |
| US11811726B1 (en) | Optimizing communication between meshnet devices in a mesh network | |
| CN115348310B (en) | Reverse proxy method, device, system, electronic equipment and storage medium | |
| EP2027691A1 (en) | Wireless networking communication | |
| Mishra et al. | Controlling PC Application through Mobile Phone |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| AS | Assignment |
Owner name: PANDUIT CORP., ILLINOIS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHURNOVIC, ROMAN J.;FRANSEN, ROBERT E.;REEL/FRAME:064257/0946 Effective date: 20230713 |
|
| AS | Assignment |
Owner name: PANDUIT CORP., ILLINOIS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RENNE, DANIEL M.;KENNEDY, JUSTIN A.;BOLOGNA, JOSEPH P.;SIGNING DATES FROM 20230207 TO 20230713;REEL/FRAME:064298/0046 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |